Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Social and Behavioral Sciences

Maturing International Cooperation To Address The Cyberspace Attack Attribution Problem, Jeff J. Mcneil Apr 2010

Maturing International Cooperation To Address The Cyberspace Attack Attribution Problem, Jeff J. Mcneil

Graduate Program in International Studies Theses & Dissertations

One of the most significant challenges to deterring attacks in cyberspace is the difficulty of identifying and attributing attacks to specific state or non-state actors. The lack of technical detection capability moves the problem into the legal realm; however, the lack of domestic and international cyberspace legislation makes the problem one of international cooperation. Past assessments have led to collective paralysis pending improved technical and legal advancements. This paper demonstrates, however, that any plausible path to meaningful defense in cyberspace must include a significant element of international cooperation and regime formation.

The analytical approach diverges from past utilitarian-based assessments to …


Telecommunications Technology And Sovereignty: Effects On States As Information Transfer Increased From The Speed Of Oxcart To The Speed Of Light, James H. Radford Jan 2005

Telecommunications Technology And Sovereignty: Effects On States As Information Transfer Increased From The Speed Of Oxcart To The Speed Of Light, James H. Radford

Graduate Program in International Studies Theses & Dissertations

Sovereignty---the absolute and unlimited power of the state---provides independence of action. Information about actions or intentions of competitors, enemies, or even friends, arriving after extended periods of time, resulted in responses to fait accompli. When information travels nearly instantaneously, states must consider potentially rapid international reactions before the fact. This suggests that since a state's freedom of action has been abridged, the nature of their sovereignty has altered.

This study pursues the research question: In what ways does telecommunications technology affect state sovereignty? The evolution of sovereignty is compared to development of telecommunications technology over four distinct eras, each …


Information Warfare: Technology And The Information Advantage, Daniel Matthew Parker Jul 1996

Information Warfare: Technology And The Information Advantage, Daniel Matthew Parker

Graduate Program in International Studies Theses & Dissertations

This thesis analyzes information warfare--that emerging form of warfare that attempts to destroy, degrade and exploit the information systems of another, while protecting one's own--in the context of the technology of warfare. Just as one might peel an onion, the analysis proceeds from a general analysis of technology in warfare to the more specific analysis of information warfare as it is currently defined. Information technology is an enabling factor in the emergence of information warfare as a new warfare area. Although it is revolutionizing the way warfare is conducted, the elements of information warfare have been practiced for thousands of …